IBM Business Process Manager Security: Concepts and Guidance IBM Business Process Manager Security: Concepts and Guidance

IBM Business Process Manager Security: Concepts and Guidance

Publisher Description

This IBM® Redbooks® publication provides information about security concerning an organization's business process management (BPM) program, about common security holes that often occur in this field, and describes techniques for rectifying these holes. This book documents preferred practices and common security hardening exercises that you can use to achieve a reasonably well-secured BPM installation.

Many of the practices described in this book apply equally to generic Java Platform and Enterprise Edition (J2EE) applications, as well as to BPM. However, it focuses on aspects that typically do not receive adequate consideration in actual practice. Also, it addresses equally the BPM Standard and BPM Advanced Editions, although there are topics inherent in BPM Advanced that we considered to be out of scope for this book.

This book is not meant as a technical deep-dive into any one topic, technology, or philosophy. IBM offers a variety of training and consulting services that can help you to understand and evaluate the implications of this book's topic in your own organization.

GENRE
Computing & Internet
RELEASED
2012
18 September
LANGUAGE
EN
English
LENGTH
162
Pages
PUBLISHER
IBM Redbooks
SIZE
5.9
MB

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server A Software Architect's Guide to New Java Workloads in IBM CICS Transaction Server
2015
Building Big Data and Analytics Solutions in the Cloud Building Big Data and Analytics Solutions in the Cloud
2014
Introduction to the New Mainframe: z/OS Basics Introduction to the New Mainframe: z/OS Basics
2011
Exploiting IBM PowerHA SystemMirror V6.1 for AIX Enterprise Edition Exploiting IBM PowerHA SystemMirror V6.1 for AIX Enterprise Edition
2014
High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows High Availability and Disaster Recovery Options for db2 for Linux, Unix, and Windows
2012

Customers Also Bought

Computer Networking Computer Networking
2018
Introduction to Artificial Intelligence for Security Professionals Introduction to Artificial Intelligence for Security Professionals
2017
Coding By Example Coding By Example
2014
iCloud iCloud
2013
Mac OS X Mac OS X
2014
Mac Management Basics 10.9 Mac Management Basics 10.9
2014